The document discusses the rise of the Islamic State of Iraq and Syria (ISIS) which has declared the areas it occupies as a new Islamic state called the Islamic State. ISIS has captured large areas of Iraq and Syria, imposing harsh Islamic law. The Israeli Prime Minister has voiced support for an independent Kurdistan, which could lead to more conflict. The document goes on to discuss issues around industrial security in India such as the need for professionalization and proper training of security professionals.
Full day seminar & training session for Emerging Threats to Safety, Security ...Amit Sharma
HIMCON Limited and Foundation JPS is Organizing Full Day Seminar & Training Session on Challenges to Leadership from Emerging Threats to Safety, Security & Disaster Management to Industrial & Corporate at Ashoka Hotel on 29th Nov. at 10:00 Hrs.
For more information visit: http://www.foundationjps.org/
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...at MicroFocus Italy ❖✔
The UK is one of the world’s leading
digital nations. Much of our prosperity
now depends on our ability to secure our
technology, data and networks from the
many threats we face.
Yet cyber attacks are growing more
frequent, sophisticated and damaging when
they succeed. So we are taking decisive
action to protect both our economy and the
privacy of UK citizens.
Our National Cyber Security Strategy sets out
our plan to make Britain confident, capable
and resilient in a fast-moving digital world.
Over the lifetime of this five-year strategy,
we will invest £1.9 billion in defending
our systems and infrastructure, deterring
our adversaries, and developing a wholesociety
capability – from the biggest
companies to the individual citizen.
From the most basic cyber hygiene, to the
most sophisticated deterrence, we need a
comprehensive response.
We will focus on raising the cost of
mounting an attack against anyone in the
UK, both through stronger defences and
better cyber skills. This is no longer just
an issue for the IT department but for the
whole workforce. Cyber skills need to reach
into every profession.
The new National Cyber Security Centre will
provide a hub of world-class, user-friendly
expertise for businesses and individuals, as
well as rapid response to major incidents.
Government has a clear leadership role,
but we will also foster a wider commercial
ecosystem, recognising where industry
can innovate faster than us. This includes
a drive to get the best young minds into
cyber security.
The cyber threat impacts the whole of our
society, so we want to make very clear
that everyone has a part to play in our
national response. It’s why this strategy is
an unprecedented exercise in transparency.
We can no longer afford to have this
discussion behind closed doors.
Ultimately, this is a threat that cannot be
completely eliminated. Digital technology
works because it is open, and that
openness brings with it risk. What we
can do is reduce the threat to a level that
ensures we remain at the vanguard of the
digital revolution. This strategy sets out how.
Full day seminar & training session for Emerging Threats to Safety, Security ...Amit Sharma
HIMCON Limited and Foundation JPS is Organizing Full Day Seminar & Training Session on Challenges to Leadership from Emerging Threats to Safety, Security & Disaster Management to Industrial & Corporate at Ashoka Hotel on 29th Nov. at 10:00 Hrs.
For more information visit: http://www.foundationjps.org/
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...at MicroFocus Italy ❖✔
The UK is one of the world’s leading
digital nations. Much of our prosperity
now depends on our ability to secure our
technology, data and networks from the
many threats we face.
Yet cyber attacks are growing more
frequent, sophisticated and damaging when
they succeed. So we are taking decisive
action to protect both our economy and the
privacy of UK citizens.
Our National Cyber Security Strategy sets out
our plan to make Britain confident, capable
and resilient in a fast-moving digital world.
Over the lifetime of this five-year strategy,
we will invest £1.9 billion in defending
our systems and infrastructure, deterring
our adversaries, and developing a wholesociety
capability – from the biggest
companies to the individual citizen.
From the most basic cyber hygiene, to the
most sophisticated deterrence, we need a
comprehensive response.
We will focus on raising the cost of
mounting an attack against anyone in the
UK, both through stronger defences and
better cyber skills. This is no longer just
an issue for the IT department but for the
whole workforce. Cyber skills need to reach
into every profession.
The new National Cyber Security Centre will
provide a hub of world-class, user-friendly
expertise for businesses and individuals, as
well as rapid response to major incidents.
Government has a clear leadership role,
but we will also foster a wider commercial
ecosystem, recognising where industry
can innovate faster than us. This includes
a drive to get the best young minds into
cyber security.
The cyber threat impacts the whole of our
society, so we want to make very clear
that everyone has a part to play in our
national response. It’s why this strategy is
an unprecedented exercise in transparency.
We can no longer afford to have this
discussion behind closed doors.
Ultimately, this is a threat that cannot be
completely eliminated. Digital technology
works because it is open, and that
openness brings with it risk. What we
can do is reduce the threat to a level that
ensures we remain at the vanguard of the
digital revolution. This strategy sets out how.
Bug bounty program offer numerous benefits to the sponsoring companies. Government organizations as well as private organizations will benefit if they have bug hunters sniffing around on their network.
It is still missing! Could the search for the missing Malaysia Airlines plane have gone much faster? I think this will become the "Natalee Holloway" (http://en.wikipedia.org/wiki/Disappearance_of_Natalee_Holloway) of air disasters - lots of breathless reports, ‘breaking news’ of no consequence coupled with gobs of bad science & bizarre theories - and no jet found!
It will be quite by accident that a pieces of debris wash-up that can once & for all confirm that it did indeed crashed -- but the bulk of the wreckage is probably entombed in 15000 feet of Indian Ocean water--never to be found. As a growing number of airplanes scoured the southern Indian Ocean in the search for Malaysia Airlines Flight 370, authorities released new details that paint a different picture of what may have happened in the plane's cockpit.
Military radar tracking shows that the aircraft changed altitude after making a sharp turn over the South China Sea as it headed toward the Strait of Malacca, a source close to the investigation into the missing flight told CNN. The plane flew as low as 12,000 feet at some point before it disappeared from radar, according to the source. And imagine that each neighboring country very aggressively monitors not only its own air-space but that of all the countries it shares boundaries of its air-space and not a bird should ideally fly without their coming to know of it. The mystery deepens on each passing days and yet there is no trace of ill-fated flight!
Back home, there were two noteworthy events for which ICISS was the event partner. In Mumbai two days seminar called Secutech India Security & Safety Conclave 2014 held from 6-7 March 2014. There were four tracks of seminars. Alongside the seminar there was well planned exhibition having latest security and safety related gadgets and systems on display from highly reputed companies. First day's seminar was inaugurated by Shri Maninderjit Singh Bitta and second day's seminar was opened by Shri Satej D Patil, the Minister of State for Home in Govt. of Maharashtra. On 21st March 2014 at Delhi, there was release of India Risk Survey 2014 which was conducted jointly by FICCI & Pinkerton. The survey report is enclosed for our esteemed members and readers.
Capt S B Tyagi
For ICISS
Monthly newsletter of International Council of Security and Safety Management.
The ICISSM web-site (http://sbtyagi.wix.com/icissm), the ICISSM Goggle group (https://groups.google.com/forum/?fromgroups#!forum/icissm), and the ICISSM LinkedIn Group (http://www.linkedin.com/groups?home=&gid=4413505&trk=anet_ug_hm)
Threat Actors and Innovators - Webinar Sparity Inc.
In this Webinar, our Director of Cyber Security Practice, Mr. Surratt will talk about "Threat Actors and Industry Targets" with the following key takeaways:
1. Understanding the threat landscape.
2. Industries currently targeted by threat actors.
3. The threat actor targeting process.
4. Sparity Foundational Security Services.
Cyber 101: An introduction to privileged access managementseadeloitte
Gartner has named privileged access management the #1 cyber security priority for organisations. But what exactly does privileged access management entail?
Event Agenda:
1. Company presentation - Welcome remarks & Introduction
2. Threat landscape - What cyber threats is Sudan facing and impact of breaches on private & public sector
3. PCI DSS - PCI benefits and opportunities for private sector and unlocking global opportunities
4. Security Operation Centers - Importance of SOC and its benefit to overall cyber resilience for public & private entities
5. Cyber insurance - Importance of having cyber insurance to hedge risk
Information Security Response Team Nepal Partnership with One Cover Pvt. Ltd, ICT FRAME Magazine, Centre For Cyber Security Research and Innovation has hosted the first ever Cyber Security Meetup in Kathmandu, Nepal on April 4, 2019 (Chaitra 21, 2075) at Nepal Telecom’s Building, Babarmahal, Kathmandu, Nepal. The event is Supported By Laba Pvt Ltd, Broadway Infosys Nepal, and Nepal Telecom Training Center Babarmahal, Kathmandu.
Thanks to Founder President at npCert (Information Security Response Team Nepal) Mr. Chiranjibi Adhikari
npcert.org
csrinepal.org
onecovernepal.com
Cybersecurity and Information Assurance - Cloud ComputingJoseph Pindar
Research paper from 2011 covering the role of Cybersecurity and Information Assurance in enterprise strategy and operational effectiveness.
Idea in Brief:
1. Cybersecurity and Information Assurance is mainly a cost of doing business with the unique opportunity to create significant value by enabling the enterprise to enter markets and use technology that competitors fear.
2. Learn from other disciplines and use existing methodologies to deliver enterprise outcomes.
3. Focus on the end-consumer
Merit Event - Closing the Back Door in Your Systemsmeritnorthwest
Loss of critical documents and data, via the back-door, is the the biggest threat to many organisations today, big and small, yet has been almost entirley neglected until now".
Barry James, the UK’s leading expert in the emerging field of mobile applications and endpoint security, will explore the emerging threat and explain the remedies available.
Corporate Espionage is a scandal done by the M.o.g ministry contemporary issue and booming business in India which is misusing the word Capital Cronism.
Bug bounty program offer numerous benefits to the sponsoring companies. Government organizations as well as private organizations will benefit if they have bug hunters sniffing around on their network.
It is still missing! Could the search for the missing Malaysia Airlines plane have gone much faster? I think this will become the "Natalee Holloway" (http://en.wikipedia.org/wiki/Disappearance_of_Natalee_Holloway) of air disasters - lots of breathless reports, ‘breaking news’ of no consequence coupled with gobs of bad science & bizarre theories - and no jet found!
It will be quite by accident that a pieces of debris wash-up that can once & for all confirm that it did indeed crashed -- but the bulk of the wreckage is probably entombed in 15000 feet of Indian Ocean water--never to be found. As a growing number of airplanes scoured the southern Indian Ocean in the search for Malaysia Airlines Flight 370, authorities released new details that paint a different picture of what may have happened in the plane's cockpit.
Military radar tracking shows that the aircraft changed altitude after making a sharp turn over the South China Sea as it headed toward the Strait of Malacca, a source close to the investigation into the missing flight told CNN. The plane flew as low as 12,000 feet at some point before it disappeared from radar, according to the source. And imagine that each neighboring country very aggressively monitors not only its own air-space but that of all the countries it shares boundaries of its air-space and not a bird should ideally fly without their coming to know of it. The mystery deepens on each passing days and yet there is no trace of ill-fated flight!
Back home, there were two noteworthy events for which ICISS was the event partner. In Mumbai two days seminar called Secutech India Security & Safety Conclave 2014 held from 6-7 March 2014. There were four tracks of seminars. Alongside the seminar there was well planned exhibition having latest security and safety related gadgets and systems on display from highly reputed companies. First day's seminar was inaugurated by Shri Maninderjit Singh Bitta and second day's seminar was opened by Shri Satej D Patil, the Minister of State for Home in Govt. of Maharashtra. On 21st March 2014 at Delhi, there was release of India Risk Survey 2014 which was conducted jointly by FICCI & Pinkerton. The survey report is enclosed for our esteemed members and readers.
Capt S B Tyagi
For ICISS
Monthly newsletter of International Council of Security and Safety Management.
The ICISSM web-site (http://sbtyagi.wix.com/icissm), the ICISSM Goggle group (https://groups.google.com/forum/?fromgroups#!forum/icissm), and the ICISSM LinkedIn Group (http://www.linkedin.com/groups?home=&gid=4413505&trk=anet_ug_hm)
Threat Actors and Innovators - Webinar Sparity Inc.
In this Webinar, our Director of Cyber Security Practice, Mr. Surratt will talk about "Threat Actors and Industry Targets" with the following key takeaways:
1. Understanding the threat landscape.
2. Industries currently targeted by threat actors.
3. The threat actor targeting process.
4. Sparity Foundational Security Services.
Cyber 101: An introduction to privileged access managementseadeloitte
Gartner has named privileged access management the #1 cyber security priority for organisations. But what exactly does privileged access management entail?
Event Agenda:
1. Company presentation - Welcome remarks & Introduction
2. Threat landscape - What cyber threats is Sudan facing and impact of breaches on private & public sector
3. PCI DSS - PCI benefits and opportunities for private sector and unlocking global opportunities
4. Security Operation Centers - Importance of SOC and its benefit to overall cyber resilience for public & private entities
5. Cyber insurance - Importance of having cyber insurance to hedge risk
Information Security Response Team Nepal Partnership with One Cover Pvt. Ltd, ICT FRAME Magazine, Centre For Cyber Security Research and Innovation has hosted the first ever Cyber Security Meetup in Kathmandu, Nepal on April 4, 2019 (Chaitra 21, 2075) at Nepal Telecom’s Building, Babarmahal, Kathmandu, Nepal. The event is Supported By Laba Pvt Ltd, Broadway Infosys Nepal, and Nepal Telecom Training Center Babarmahal, Kathmandu.
Thanks to Founder President at npCert (Information Security Response Team Nepal) Mr. Chiranjibi Adhikari
npcert.org
csrinepal.org
onecovernepal.com
Cybersecurity and Information Assurance - Cloud ComputingJoseph Pindar
Research paper from 2011 covering the role of Cybersecurity and Information Assurance in enterprise strategy and operational effectiveness.
Idea in Brief:
1. Cybersecurity and Information Assurance is mainly a cost of doing business with the unique opportunity to create significant value by enabling the enterprise to enter markets and use technology that competitors fear.
2. Learn from other disciplines and use existing methodologies to deliver enterprise outcomes.
3. Focus on the end-consumer
Merit Event - Closing the Back Door in Your Systemsmeritnorthwest
Loss of critical documents and data, via the back-door, is the the biggest threat to many organisations today, big and small, yet has been almost entirley neglected until now".
Barry James, the UK’s leading expert in the emerging field of mobile applications and endpoint security, will explore the emerging threat and explain the remedies available.
Corporate Espionage is a scandal done by the M.o.g ministry contemporary issue and booming business in India which is misusing the word Capital Cronism.
The presentation describes the technology which is been used for national security. These are the most powerful technology to prevent from danger. We could find new technology which has not been seen.
The Industrial Internet is a massive game changer with its commercial value estimated at $33 trillion. Not only is it expected to give a strong boost in confidence to global GDP, increase performance even in customized production, and introduce a more sustainable manufacturing model, but it is also a remarkable accelerator of technological innovation. To be part of this evolution, OEMs need to implement guidelines that will reshape workflows and help them boost productivity. Security aspects are particularly relevant as they represent the keystone of the new connected infrastructure.
Over the recent years, Wibu-Systems has hardened CodeMeter®, its own protection, licensing, and security technology, to withstand ruggedized environments. Unlike the office world, many sectors of industry have special requirements, often characterized by substantial swings in temperature, humidity, and vibrations. This implies a complete redesign of the hardware secure elements where machine code is encrypted, login credentials stored, and licenses saved.
Among the many components that were carefully picked and subjected to extensive tests, the flash memory is one of the most critical ones. Our trusted solution partner Swissbit will cohost a webinar with us to shed light on the elements that should guide intelligent device manufacturers in their choice of reliable and fail-safe embedded memory.
During this event, you will be able to learn about:
- Security threats that undermine connected industry
- Pros and cons of industrial storage solutions
- Fundamentals of flash memory NAND technology
- Product highlights of Swissbit memory components
- Benefits of adding security to a memory component
- Available solutions for IP and integrity protection
- Use cases for combining storage and security
- Examples of an integration process workflow
Safeguard your knowledge with an all-round solution tailored to meet the needs of the most demanding market segments, including industrial, automation, automotive, networking and telecommunications, healthcare and life science, and defense.
Watch the webinar: https://youtu.be/rsx6XoMoLIM
Monthly newsletter of International Council of Security and Safety Management.
The ICISSM web-site (http://sbtyagi.wix.com/icissm), the ICISSM Goggle group (https://groups.google.com/forum/?fromgroups#!forum/icissm), and the ICISSM LinkedIn Group (http://www.linkedin.com/groups?home=&gid=4413505&trk=anet_ug_hm)
Brief Resume of Capt. S B Tyagi, FISM, CSC
• Holds Masters’ degrees in Philosophy, Sociology, Defense Studies & Political Science beside B.Sc. and LLB. He is also holding master’s degree in Business Administration and post graduate diplomas in Business Administration, Personnel Management & Industrial Relations and Safety & Security Management.
• Twenty eight years experience (including Army) in the field. Presently working in GAIL (India) Limited as Chief of Security at its Corporate Office.
• Have been regular faculty in Management Institutes. Various articles are published in related magazines and internet sites.
• Writer of best selling book on Industrial Security - “Industrial Security: Management & Strategies”.
• Made presentations in more then 18 international seminars on the subjects of homeland security and industrial security.
• The Honorable Lt. Governor of Delhi bestowed the most coveted ‘Best Security Manger’ award to Capt S B Tyagi on 30th August 2007 instituted by Security Today, a leading niche magazine for the protection industry. The award is testimony of untiring efforts, constant application of noble approaches in security management, innovation and leadership in the profession which have been distinctly displayed by Capt S B Tyagi. He has been recognized in past too for the similar qualities when he was awarded ‘Best Security Manager’ in 2002 and ‘Best Security Operation Manager’ in 2004 by IISSM (International Institute of Security and Safety Management).
• Given ‘Certification of Recognition’ and awarded as ‘Best Security Practitioner’ in GAIL in year 2009.
• Recipient of “Award of Fellowship (FISM)” and is “Certified Security & Safety Consultant (CSC)” by the “International Institute of Security & Safety Management”.
• Co-founder of “International Council of Industrial Security and Safety”.
• Mail id: sbtyagi1958@gmail.com ; sbtyagi@gail.co.in
• Blog: http://captsbtyagi.blogspot.com
• Web-site: http://www.wix.com/sbtyagi/iciss
• Holds Masters’ degrees in Philosophy, Sociology, Defense Studies & Political Science beside B.Sc. and LLB. He is also holding master’s degree in Business Administration and post graduate diplomas in Business Administration, Personnel Management & Industrial Relations and Safety & Security Management.
• Twenty eight years experience (including Army) in the field. Presently working in GAIL (India) Limited as Chief of Security at its Corporate Office.
• Have been regular faculty in Management Institutes. Various articles are published in related magazines and internet sites.
• Writer of best selling book on Industrial Security - “Industrial Security: Management & Strategies”.
• Made presentations in more then 18 international seminars on the subjects of homeland security and industrial security.
• The Honorable Lt. Governor of Delhi bestowed the most coveted ‘Best Security Manger’ award to Capt S B Tyagi on 30th August 2007 instituted by Security Today, a leading niche magazine for the protection industry. The award is testimony of untiring efforts, constant application of noble approaches in security management, innovation and leadership in the profession which have been distinctly displayed by Capt S B Tyagi. He has been recognized in past too for the similar qualities when he was awarded ‘Best Security Manager’ in 2002 and ‘Best Security Operation Manager’ in 2004 by IISSM (International Institute of Security and Safety Management).
• Given ‘Certification of Recognition’ and awarded as ‘Best Security Practitioner’ in GAIL in year 2009.
• Recipient of “Award of Fellowship (FISM)” and is “Certified Security & Safety Consultant (CSC)” by the “International Institute of Security & Safety Management”.
• Co-founder of “International Council of Industrial Security and Safety”.
• My mail id: sbtyagi1958@gmail.com ; sbtyagi@gail.co.in
• Blog: http://captsbtyagi.blogspot.com
• My web-site: http://www.wix.com/sbtyagi/iciss
WORK & STRESS, 1998, VOL. 12, NO. 3 293-306 Achieving a sa.docxambersalomon88660
WORK & STRESS, 1998, VOL. 12, NO. 3 293-306
Achieving a safe culture: theory and practice
JAMES R E A S O N
Department of Psychology, University of Manchester, Manchester M13 9PL, UK
Keywords: Safety culture; Accidents; Organizational factors; H u m a n error.
This paper discusses four topics relating to safety culture, three theoretical and one practical. The first
considers why it is that an unsafe culture is more likely to be involved in the causation of organizational
rather than individual accidents. It is the pervasive nature of culture that makes it uniquely suitable
for creating and sustaining the co-linear gaps in defences-in-depth through which an accident
trajectory has to pass. The second topic relates to pathological adaptations, and discusses two
examples: the Royal Navy of the mid-nineteenth century and the Chernobyl reactor complex. The
third issue deals with recurrent accident patterns and considers the role of cultural drivers in creating
typical accidents. The final topic is concerned with the practical question of whether a safety culture
can be engineered. It is argued that a safe culture is an informed culture and this, in turn, depends upon
creating an effective reporting culture that is underpinned by a just culture in which the line between
acceptable and unacceptable behaviour is clearly drawn and understood.
1. Introduction
Although there is no universally accepted definition of safety culture, there can be little
doubt that it is a concept whose time has come. Since the beginning of 1997, there have been
well-attended meetings and workshops devoted exclusively to this topic, and the interest
extends across many work domains. For example, the US National Transportation Safety
Board’s (NTSB) symposium on ‘ Corporate Culture and Transportation Safety ’ in April
1997 attracted some 550 delegates from all of its constituencies : aviation, railroads,
highways, the marine world, pipelines and the safety of hazardous materials. The
symposium was convened because the NTSB’s accident investigators were increasingly
conscious of the crucial role played by cultural factors in creating bad events (see, for
example, NTSB/AAR 1994, 1997, NTSB/RAR 1996).
The high level of concern with organizational culture in the world of hazardous
technologies poses both a challenge and an opportunity for those academics involved in the
safety-related sciences. W e need to develop a clearer theoretical understanding of these
organizational issues to create a principled basis for more effective culture-enhancing
practices. To this end, the paper presents arguments dealing with four culture-related issues,
three largely theoretical and one with more directly practical applications.
First, are modern, high-tech, well-defended technologies-such as nuclear power plants,
chemical process plants and commercial aviation-more vulnerable to the effects of a poor
safety culture than traditional industries involv.
Training Session for Safety, Security and Disaster Management for Industrial ...Foundation JPS
FOR BUSINESS LEADERS, CORPORATE SENIOR MANAGEMENT, MIDDLE LEVEL MANAGEMENT, INDUSTRIAL SECTOR CORPORATE HOSPITALS, FIVE STAR HOTELS, OFFICERS FROM THE ARMED FORCES & PARAMILITARY FORCES AND ALL SAFETY AND SECURITY RELATED EXECUTIVES AND TRAINEES, MBA’S / ENGINEERING GRADUATES
For more Information Please Visit:- http://foundationjps.org/
BCJ 4385, Workplace Security 1 UNIT II STUDY GUIDE T.docxJASS44
BCJ 4385, Workplace Security 1
UNIT II STUDY GUIDE
Threats and Legal Aspects to Security
Course Learning Outcomes for Unit II
Upon completion of this unit, students should be able to:
1. Evaluate threats to safety and security within the private, corporate, and
local level.
2. Analyze the legal issues present within the private security profession
and the court of law.
3. Outline various crime causation theories and how this impacts
workplace security.
Unit Lesson
General Overview
Have you ever entered an area or a building and immediately felt as if you were
in imminent danger? Do you remember that feeling you get in your chest and gut
when you almost slip and fall on the wet tile floor in your house? Alternatively,
have you entered a building and felt like you were trying to enter an armory?
Have you ever been stopped in an arena or airport or even a shopping mall and
asked to provide your bag for searching? You’ve probably answered yes to at
least one of these questions. We have all, whether we realize it or not,
experienced threats to our safety and security and benefited from the legal
aspects of safety that help provide ethical standards and expectations for the
maintenance of safety.
Threats to safety and security can be intentional or unintentional and, as such,
have numerous sources. These sources range from accidents and human error,
to natural and environmental disasters, to civil disorder and crime. For example,
identity theft is a major concern since much of the commerce transactions are
now done online. Oftentimes the theft is a result of human error, such as not
shredding documents that contain personal information or not using a secure
web browser to conduct transactions. Human error is also exhibited when
employees do not properly handle merchandise, resulting in its theft, damage, or
lack of repair. Natural disasters are said to be a direct result of “the forces of
nature.” We often see natural disasters in the form of forest fires, earthquakes,
and tsunamis. On the other hand environmental disasters are the result of
hazardous materials being released into the environment. These types of
disasters are the result of some type of hazardous materials being released in
larger amounts into the environment (e.g., oil spill, leakage of nuclear reactors).
Fire and environmental disasters are examples of how the sources of the threats
to security and safety can be hard to identify and/or intertwined. A fire can be
started by lightning, it can result from human error that causes a spark (e.g., a
loose metal chain being dragged across concrete at high speeds), or it can result
from intentional criminal behavior, in which an arsonists sets a fire to cause
widespread damage. An environmental disaster, such as an oil spill, may have
resulted from an accident, such as two ships colliding or some mechanical
failure. Environmental disasters can also be the result of companies ...
This month, there are two important events taking place – one in Mumbai (India) and other one in Abu Dhabi (UAE) and ICISS is Event Partner for both of them! While the seminar in Mumbai, “Secutech India Safety & Security Conclave 2014” is focusing on Security Solutions for Vertical Markets, the “Global Energy Security Conference 2014” in Abu Dhabi will have in-depth discussions on Corporate Security Integration with the Business, Security Mitigation Measures for International Companies and Ensuring Security at Oil & Gas Infrastructure in High Risk Areas against Terrorism.
The Pinkerton initiatives in India have been very useful in identifying the real threats faced by various sectors and strategies to mitigate them. The past survey results have been found very useful by the Corporates operating in India and for those wishing to set-up their operations in India in formulating their Security & Risk Policies and the measures to counter the treats. Like last year, the ICISS has partnered in this survey and we request all our readers to positively respond to this survey.
Capt S B Tyagi
For ICISS
Security professionals in general and Indian security professionals in particular have reasons to rejoice as doyen of Indian Industrial Security has achieved the positions in the governance and decision-making where his rich experience, profound industrial insight and deep-rooted commitment for the betterment of the Indian Security Industry will see some long term initiatives and beginning of new policies aimed to strengthen the overall position and future development of the Industry.
Shri RK Sinha has been nominated as candidate for election as member of the Rajya Sabha (Upper House of Indian Parliament) recently. Shri R K Sinha, fondly known as RK in the security fraternity is a man of many hues. Mr. Sinha started Security & Intelligence Services (India) Limited with a team of two persons from a small rented office in the eastern parts of India in 1974. Today, SIS Group is recognized as one of the leaders in manpower security business in Asia Pacific with over 36,000 permanent employees and 3000 corporate customers.
Mr. Sinha is widely recognized as a pioneer and Industry leader. He represents the private security industry before government bodies for legislation and regulatory matters regularly. Mr. Sinha also served as an Advisor to Ministry of Human Resource Development, Government of India (1999 - 2004).
Capt S B Tyagi
For ICISS
Monthly newsletter of International Council of Security and Safety Management.
The ICISSM web-site (http://sbtyagi.wix.com/icissm), the ICISSM Goggle group (https://groups.google.com/forum/?fromgroups#!forum/icissm), and the ICISSM LinkedIn Group (http://www.linkedin.com/groups?home=&gid=4413505&trk=anet_ug_hm)
Monthly newsletter of International Council of Security and Safety Management.
The ICISSM web-site (http://sbtyagi.wix.com/icissm), the ICISSM Goggle group (https://groups.google.com/forum/?fromgroups#!forum/icissm), and the ICISSM LinkedIn Group (http://www.linkedin.com/groups?home=&gid=4413505&trk=anet_ug_hm)
Monthly newsletter of International Council of Security and Safety Management.
The ICISSM web-site (http://sbtyagi.wix.com/icissm), the ICISSM Goggle group (https://groups.google.com/forum/?fromgroups#!forum/icissm), and the ICISSM LinkedIn Group (http://www.linkedin.com/groups?home=&gid=4413505&trk=anet_ug_hm)
Monthly newsletter of International Council of Security and Safety Management.
The ICISSM web-site (http://sbtyagi.wix.com/icissm), the ICISSM Goggle group (https://groups.google.com/forum/?fromgroups#!forum/icissm), and the ICISSM LinkedIn Group (http://www.linkedin.com/groups?home=&gid=4413505&trk=anet_ug_hm)
Monthly newsletter of International Council of Security and Safety Management.
The ICISSM web-site (http://sbtyagi.wix.com/icissm), the ICISSM Goggle group (https://groups.google.com/forum/?fromgroups#!forum/icissm), and the ICISSM LinkedIn Group (http://www.linkedin.com/groups?home=&gid=4413505&trk=anet_ug_hm)
Monthly newsletter of International Council of Security and Safety Management.
The ICISSM web-site (http://sbtyagi.wix.com/icissm), the ICISSM Goggle group (https://groups.google.com/forum/?fromgroups#!forum/icissm), and the ICISSM LinkedIn Group (http://www.linkedin.com/groups?home=&gid=4413505&trk=anet_ug_hm)
Monthly newsletter of International Council of Security and Safety Management.
The ICISSM web-site (http://sbtyagi.wix.com/icissm), the ICISSM Goggle group (https://groups.google.com/forum/?fromgroups#!forum/icissm), and the ICISSM LinkedIn Group (http://www.linkedin.com/groups?home=&gid=4413505&trk=anet_ug_hm)
Monthly newsletter of International Council of Security and Safety Management.
The ICISSM web-site (http://sbtyagi.wix.com/icissm), the ICISSM Goggle group (https://groups.google.com/forum/?fromgroups#!forum/icissm), and the ICISSM LinkedIn Group (http://www.linkedin.com/groups?home=&gid=4413505&trk=anet_ug_hm)
Monthly newsletter of International Council of Security and Safety Management .
The ICISSM web-site (http://sbtyagi.wix.com/icissm), the ICISSM Goggle group (https://groups.google.com/forum/?fromgroups#!forum/icissm), and the ICISSM LinkedIn Group (http://www.linkedin.com/groups?home=&gid=4413505&trk=anet_ug_hm)
Nowadays women are giving stiff competition to men and dominating all areas earlier thought to be the stronghold of men. But, as the common perception goes, the corporate world can be quite ruthless for women and they may have to go through a host of trials and tribulations to get to the top of their career. However, being familiar with the difficulties of office life can help prepare a woman and instill survival instincts that can also keep her safe in tough and stressful times. Below are mentioned some safety tips that can help keep you secure while building your corporate career
By: Capt. S B Tyagi, FISM, CSC
What makes a serial killer tick? How do forensic experts solve crimes using cutting-edge technology? Who are the men and women that risk their lives to put criminals behind bars?
These questions and more are related to the subject of Crime Investigation. Real crime, real people, real drama - Crime Investigation is the hard work by the true professionals who work meticulously and methodically to solve the mystery behind the crime – motive, the modus-operendai and men involved in crime! Crime Investigation opens the door to crime labs, police archives and courtrooms, providing a behind-the-scenes look at criminal investigations and probing unexplained mysteries.
Physical Evidence at a Crime Scene
Evidence used to resolve an issue can be split into 2 areas - testimonial evidence and physical evidence. The testimonial evidence would be any witnessed accounts of an incident. The physical evidence would refer to any material items that would be present on the crime scene. These items would be presented in an issue or incident to prove or disprove the facts of the issue. What will evidence collected at a scene do for the investigation -
• May prove that a crime has been committed.
• Establish any key elements of a crime.
• Link a suspect with a scene or a victim.
• Establish the identity of a victim or suspect.
• Corroborate verbal witness testimony.
• Exonerate the innocent.
The evidence that is located and recovered at a scene will give the detectives responsible for the investigation leads to work with in the case.
Discusses the do's and dont' in case of child abduction and also the precautions to be taken by parents, school authorities and well-wishers to reduce the chances of child abduction.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
Delivering Micro-Credentials in Technical and Vocational Education and TrainingAG2 Design
Explore how micro-credentials are transforming Technical and Vocational Education and Training (TVET) with this comprehensive slide deck. Discover what micro-credentials are, their importance in TVET, the advantages they offer, and the insights from industry experts. Additionally, learn about the top software applications available for creating and managing micro-credentials. This presentation also includes valuable resources and a discussion on the future of these specialised certifications.
For more detailed information on delivering micro-credentials in TVET, visit this https://tvettrainer.com/delivering-micro-credentials-in-tvet/
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
Thinking of getting a dog? Be aware that breeds like Pit Bulls, Rottweilers, and German Shepherds can be loyal and dangerous. Proper training and socialization are crucial to preventing aggressive behaviors. Ensure safety by understanding their needs and always supervising interactions. Stay safe, and enjoy your furry friends!
1. Newsletter: July 2014
Let’s professionalize the professionals…
http://sbtyagi.wix.com/icissm
It was jokingly said that whereas all the countries have armies, it is Pakistani Army which has got the
country. Soon same expression underwent change and in reference to Nepal it was said that, ‘all
terrorists aspire to rule a Nation whereas now ruling is to nationalize the terrorists in Nepal! The
Maoists were not even comfortable in changing role they were to play from terrorists to ruling outfit
that something dramatic has happened in Syria and Iraq!
C:UserssbtyagiDownloadsNews Letter July 14.docx
The Islamic State of Iraq and Syria
(ISIS) has reportedly declared the
areas it occupies in Iraq and Syria
as a new Islamic state, removing
Iraq and the Levant from its name.
ISIS declares its territories a new
Islamic state with 'restoration of
caliphate' in Middle East. It is
known as Islamic State of
Khorasan. The Militants name Abu
Bakr al-Baghdadi as Caliph in a
move representing 'new era of
international jihad'. The
announcement will see ISIS now
simply refer to itself as ‘The Islamic
State’, and the group has called on
al-Qa’ida and other related militant Sunni factions operating in the region to immediately pledge their
allegiance.
In recent fast paced advances, ISIS has captured large areas of western and northern Iraq and for
two years has held parts of Syria, imposing a harsh interpretation of Islamic law and in many cases,
killing large numbers of opposition Shia Muslims.
The Israeli Prime Minister, Binyamin Netanyahu, has voiced support for Kurdish statehood, taking a
position that appears to clash with the US preference to keep sectarian war-torn Iraq united.
Netanyahu has called for the establishment of an independent Kurdistan as part of a broader alliance
with moderate forces across the region, adding that Israel would have to maintain a long-term military
presence in the West Bank even after any future peace agreement with the Palestinians. This
posturing will lead to more deaths and destruction.
We have much more mayhem and madness to witness before order is restored in the region.
3. “When a man in soul, the intellect is dead, unchecked evil prevails” – so said
Eckhart! Certain things are for certain, and must happen with passage of time.
These could both be positive or negative. Let us face the reality; most of these
are negative in nature. Pearl S Buck, in ‘The Good Earth’ stated that, ‘when
the rich get too rich, the poor shall not sit back but react to correct the
C:UserssbtyagiDownloadsNews Letter July 14.docx
4. imbalance’.
That the ‘rate of crimes shall definitely continue to rise’ should be the foregone deduction of the
conditions prevailing in our society. Because…
Inflation rates notwithstanding, the money shall continue to buy less and less.
The good old values shall continue to erode.
The forces of nature shall continue to be challenged by the technology growth.
Industrialization and mechanization shall continue to affect the nature adversely, thereby
adding to the pollution and environmental degradation.
Our vulnerabilities in the areas of fire, safety and security are going to go up!
We need to focus on Total Loss Prevention Program (TLPP)
The ruthless ambitious nature of the human being shall continue to harness unhealthy competition.
This shall result in personal aggrandizement of wealth in the hands of the few, conversely poverty
shall increase, and so shall the numbers that shall be afflicted by it. All the deteriorating conditions
shall have multiplier adverse effect on the security and safety of our society, as also the Corporate
and Industry.
The prevailing conditions in India have focused every body’s attention to the security measures in the
industry which started taking appropriate measures in this regard. The concerted and tangible
attempts by the industries have been visible since last three decades as far as security manpower is
concerned. Introduction of technical gadgets is hardly a decade old phenomenon.
Three developments are taking place in India –
Opening-up of economy in last decade and despite odds, most stable
Tremendous development of Information technology
Realization that India can, and, will be a major power in the world, and, efforts of Industries to
get ready for it.
As a result ‘Industrial Security’ has gained importance and it is being treated as profit making activity.
We all have a responsibility to safeguard the company’s assets and interests, including its name,
image and reputation, by treating all company property with the same respect as we would our own.
Bloom time or gloom time, security and safety industry is going to grow as during bloom time asset
creation and profit making will lead to enhanced security and gloom time will lead to depression, short
supply and high demands and will lead to anarchy when higher security is needed by
Industry. Safety will be hand-in-hand with changing security landscapes.
As in war, in field of security it is not who is right, but who is ‘left’. We will be known not by what we
have done, but, by what we have not done!
Let’s do it right!!!
C:UserssbtyagiDownloadsNews Letter July 14.docx
5. D.C. Nath, IPS (Retd.)
Mr. DC Nath is Chief Patron of International Council of Security & Safety
Management. Superannuated in January, 1995, as the Special Director,
Intelligence Bureau, Mr. D.C. Nath (IPS-1960) has been a visiting faculty to a
number of Institutes (like the Indian Institute of Public Administration (IIPA), Sardar
Vallabhbhai Patel National Police Academy (SVPNPA), Lal Bahadur Shastri
National Academy of Administration (LBSNAA) and Academies, including
Management Training Institutes, covering different aspects of security and
industrial security management.
He is recipient of both the honors available in the police service, namely, Indian
Police Medal for meritorious services and the President’s Police Medal for
distinguished services. His name figures in the American Police Hall of Fame, a Trust of the US National
Association of Chiefs of Police. In December 2010, the International Who’s Who Historical Society included
his name in the 2010-2011 edition of the “International Who’s Who of Professionals”.
It is a common sarcasm to say that the medical profession is the largest profession. There is hardly
anyone who does not or who cannot prescribe a medicine the moment one hears of a disease.
Slightly on a similar scale, any one with police or army background almost intuitively or instantly lays
claim on being an expert in security – no matter what kind of security is being referred to. The fact
that many such claimants might not have had any security-related assignment whatsoever during
their long service career is a distinct possibility and a fact of life.
In this situation, it is difficult where and how to start analyzing the factors leading to a successful
industrial security career. Do the present-day industrial security practitioners really have any
professional training or one might even say, indoctrination into what industrial security is? The
answer generally is in the negative. There are many factors to explain this situation and it is not
intended to put blame on any individual. By and large, there is considerable lack of institutional
training in this field. Even where some such system is available, proportionately more attention is
focused on making young entrants physically fit and mentally alert in security duties. Resultantly, not
much emphasis is paid on teaching the basic concepts of industrial security. It was a sad experience
while talking to some young or budding industrial security managers that many of them were not
really cognizant about the different facets of industrial security, as it has come to develop in the
modern days. Most of them remain engaged in supervision and guiding guard duties and some of
them excel in that as well, without ever knowing or appreciating the overall concepts or problems of
security. That is unfortunate. Lack of adequate knowledge content stands in their way of turning into
true professionals which they must become at all cost.
Where does really industrial security start? It starts with security survey. Is that often done? A
security manager receives an assignment of guarding or escorting. He completes his assignment
successfully and feels contented. Thus all the skill or talents he might have had get rusted. He
receives no systematic exposure to what industrial security is really comprised of. Then, security
assignments are indeed varied, such as, bank security, office security, shop security, M.S. building
security, open area residential security, plant security, etc. Yes, guarding and patrolling are essential
and basic to the security needs in these assignments but the overall security perception would
C:UserssbtyagiDownloadsNews Letter July 14.docx
6. certainly require more than these basic skills. Very soon it happens that the security managers start
feeling neglected as belonging to a second class profession, so to say, put under the charge of
Administration or Personnel or HRD Department, to many of whom security management or
arrangement is an anathema. This is notwithstanding the fact that at times one finds good HRD Chief
with the correct security perception.
A true security professional will, however, have to start from there or from this situation. How should
he or she go about it? A few questions would clarify. Does he or she think about the overall scope of
security in his/her assignment, particularly if it is in any installation or in office or any such big unit?
This thinking exercise is imperative so as to develop the correct perception of the task in hand.
Does the security expert maintain any record to build up database, which is absolutely necessary to
drive home any contentious issues not otherwise acceptable? Often there is lethargy in drawing up
the factual record of an incident where security has played some definite role under the misconceived
perception that it was unimportant or might not be taken note of. The strength of a security unit will lie
primarily on record or database built up over a period of time. Facts speak for themselves if
marshaled and projected in a professional manner.
Does a security expert think that he is a drain on the management unless he could prove the positive
aspects of his function? It is more or less like the law enforcement machinery in the society. The
police were generally considered a necessary evil but now enlightened citizens cannot turn blind eye
to the social and corrective role of the police in the society. Similarly, many will not like a security
functionary but the latter will have to have the missionary zeal to befriend others and make them
understand their role in security, i.e., security is the concern of all.
In order to achieve success, a security officer will have to prepare periodical reports or individual
case studies or even normal incident reports in a manner bringing out the implications of an incident,
such as, if some steps were not taken, what further loss would have resulted or what further dangers
will lurk ahead. A security expert will have to visualize and may perhaps have to imagine realistically,
to put this in a figure of speech fashion, to work out the loss prevention aspect of security functions.
All this, however, is not so simple or easy. A security expert will have to acquaint himself with the
functioning of all other departments to appreciate their relevance to the management concerned,
which by and large and basically is to earn profit. An inter-departmental exposure to various functions
and adaptation of an inter-disciplinary approach have often paid dividends hands down. Many
security experts will be amazed to know that not infrequently extremely valuable suggestions relevant
to security have come from non-security personnel.
An aspect often lost sight of or is not considered relevant is the intelligence angle behind security
functions. Even without having had problems, such as, relating to business espionage, intelligence
input is essential not only for success but for survival as well. This had been true in the beginning of
human civilization and holds good even today.
A pitfall often noticed among many security experts is the lack of orientation towards modern or the-state-
of-the-art technological aids now available to security. This is primarily because of the financial
implications, as on the face of it security equipment require initial investment not easily seen to be
commensurate with the apparent or immediate result. Systematic efforts will be required to
demonstrate and prove how such technical measures will eventually be cost-effective and prove to
C:UserssbtyagiDownloadsNews Letter July 14.docx
7. be economical. There has to be a correct mix of men and machine in working out a typical integrated
security system. This needs knowledge and self-education. In these days of stiff competition where
the management themselves find it difficult to survive unless well up in business strategy, security
experts will also have to learn to anticipate and adjust to face emerging challenges which keep on
changing both in variety and quality. A proactive approach backed up by professional knowledge and
commitment integrating oneself with the management is the need of the day.
Another basic drawback a security expert needs to guard against in order to achieve any kind of
success is lack of knowledge about the management’s overall perception or attitude towards security.
Whereas a security expert will have to bring round his management to the correct line of security
concern, he in his turn needs to merge himself with the business trend so to say. He will have to
make efforts to fit in and justify his existence proving that security is not an unnecessary expense but
an essential management tool and function. After all, no management will like to place themselves in
any insecure position but the onus is on the security practitioners to prove that they can provide the
same – both in physical and financial terms.
All successful men in life have necessarily been able leaders. There cannot, therefore, be any
gainsaying the fact that a security manager has to develop himself into a good leader, confident in his
professional outlook, committed to discharging his tasks with honesty and integrity, looking after his
men with love and care, while gearing up himself all the time to face emerging challenges with
determination.
To sum up, a security practitioner, aspiring to make a successful career will have to:
think, learn and learn
be a true and knowledgeable professional
apply himself with commitment
build up database with case studies
prove his worth or usefulness
have intelligence back-up system
know about the business in totality
adopt an inter-disciplinary approach
integrate with the management
be a true leader of men
Success cannot, and will not, elude such a security practitioner!
C:UserssbtyagiDownloadsNews Letter July 14.docx
8. Capt G Raj Kumar is ICISS State Councilor for Andhra Pradesh. He has total 25 years of
experience out of which he served 14 years in the Armed Forces and rest 11 years in the
industry. He has unique distinction of serving in Air forces as well as in Army. While in Armed
Forces he has been extensively involved in Counter Insurgency Operations.
He holds degree of MBA (HRD) from Rani Durgavati University, Jabalpur. Presently he is
pursuing a Ph. D in Personnel Management. At present he is working in GAIL and is posted at
Vizag, Andhra Pradesh. A keen sports enthusiast, he represents Andhra Pradesh Badminton
Team. Previously he has played in badminton tournaments conducted by Petroleum Sports
Control Board of India.
He can be reached at grajkumar@gail.co.in
Security professional challenges within are of utmost importance than that of external. It has been
evident that lack of professionalism is haunting the security profession, of late. As the threats have
seemingly complex and are faceless. Adding fuel to the fire, the rapid growth of technology is aiding
the anti-socials / thieves to have edge over us. Crimes of faceless, boundary less, virtual, remote-controlled,
hi-tech and criminal cosmopolitanism have further burdened our shoulders. To my insight,
in this environment the only way to survive is to follow the way as enumerated by the great Sun Tzu -
“If you know the enemy and know yourself, you need not fear the result of a hundred
battles. If you know yourself but not the enemy, for every victory gained you will also
suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every
battle”.
Thus it is warranting us to be more tech-savvy and forethoughtful. As everyone in this profession
would agree with me that unlike other departments or professions, we do not have scope of pass
percentage or % of target achieved. We have only two parameters i.e., either we pass or fail. In other
words, we may conclude saying that if we provide an incident free period, we may call it 100%
success.
In recent times, more and more companies are tilting towards technology and acquiring various
technical gadgets in a big way. Everyone talks about CCTV, Baggage Scanners of various types,
Bollards, Access Control Systems, etc.
It is definitely a good sign, but then, there are certain aspects which need to be deliberated upon for a
better output and ROI (return on Investment). Technology abundance, variety of gadgets and
mushrooming business firms selling them has created a type of confusion in the minds of us i.e. end-users
/ security professionals. This is an inherent challenge we are facing now. In this situation either
we depend on some technical departments or copy the specifications from someone who have
already done some homework on this.
The other intriguing aspect of present day is that someone has installed a high-tech security gadget,
and, we decide to install similar or preferably a better or higher technology gadget in our organization.
This results into a situation when most of the advanced features and applications remain unused or
undesired. Someone has said that, “If we think that technology is going to solve all our problems then
we either do not understand our problems or we do not understand the technology!”
C:UserssbtyagiDownloadsNews Letter July 14.docx
9. I am of firm opinion that ‘Science is good servant, but a bad master’! Let us use it optimally. Let us
not totally depend on technology. Technology after all is as good as men behind the machine!
Emphasis on human resources improvement / development should be given priority at par with
technology. Whereby, the technology would complement the manpower to get maximum benefit
/outcome. In this process there are certain points which I would like bring out here:
Man behind the machine has equal or more importance than the gadget. Hence, to be given due
diligence in selecting.
Train and re-train the available human resources at our disposal for augmentation of existing
security set-up.
Acquire compatible, suitable and relevant security gadgets rather than going for sake of it or
following others or going for higher technology.
Lack of customer oriented and suiting software for various technical gadgets available in the
market and complex & ever changing nature of threats compelling us to declare gadgets as
‘obsolete’ in very short period.
Adding to this is rapid technological advancement and substandard equipment floating in the
markets. The price range of these equipment is mind boggling. You would get a CCTV camera
with almost similar specifications for a very surprising price range. One can use a Rs.350 camera
brought from Gaffar Market, New Delhi or use a reputed brand camera costing almost Rs.7,000/-,
the quality of the footage has no drastic difference. This is an example to state that the range is
wider.
There is a short-fall or slackness in developing a road map for implementing a well-planned
enterprise level integrated security systems set-up. Most of the organizations go for a piece-meal
procurement and installation of few security gadgets. We as professionals can chalk out a plan
for systematized implementation of ‘Enterprise Security Solution’. Wherein any gadget procured
should fall in the already chalked out plan only. This way one can, over a period of time,
implement the road map and integrate the gadgets on one platform. This we may call it enterprise
security umbrella. This is good for bigger organizations as well as small organizations or
residential houses/apartment.
We, Security professionals, should develop a habit of making notes of events, incidents,
accidents and other activities nearby or concerning.
By generating lot of data, we should also be able to analyse the same and put to use for benefit our
profession. As it is rightly said that “Noticing small changes early helps you adapt to the bigger
changes that are to come”. Many organizations do not take in to account the security aspect at
blue print stage whereby end-up in spending a lot in modifying the already built structures /
perimeters. In many western countries, and, in fact in many of our country’s top business houses, the
Security Department’s input is considered at blue print stage itself. Here it is the security
professional’s task in proving his / her competence by implementing CPTED (Crime Prevention
through Environmental Design). This helps the management decisions, since it gives due importance
and value for environment as well as aesthetics. Finally come what may be, the vital element of
Industrial Security or Residential Security or any form of security is ‘right manpower’ for it to be
effective and efficient.
The established wisdom of criminology is “Crime follows Opportunity”, hence our prime motto
should be “Opportunity Reduction”. To my knowledge, common-sense, forethought, planning,
C:UserssbtyagiDownloadsNews Letter July 14.docx
10. timely implementation, system monitoring including feedback, review and redesigning are the vital
elements of security profession. With this emerges a thumb rule of Security ‘ASC’:
Assume Nothing Suspect Anything Check Everything
ICISS at LinkedIn: http://www.linkedin.com/groups?gid=4413505&trk=hb_side_g
ICISS at Google Group: https://groups.google.com/forum/?fromgroups#!forum/icissm
Suggestions & feedback may be sent to us on e-mail: onlineicissm@gmail.com
P.S. - If you don't like to receive our newsletter, we apologize for bothering you. Please let us know
your mail address and we will move it out from our contact list, thank you!
C:UserssbtyagiDownloadsNews Letter July 14.docx